General

  • Target

    https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Ransomware.Cryptowall/Ransomware.Cryptowall.zip

  • Sample

    231115-s5z4asbh37

Malware Config

Targets

    • Target

      https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Ransomware.Cryptowall/Ransomware.Cryptowall.zip

    • CryptoLocker

      Ransomware family with multiple variants.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks